Linux SecurityLinux articles and HOWTOs showing users how to secure their system.Tue, 31 Mar 2015 22:02:56 +0000Tue, 31 Mar 2015 22:02:56 +0000Linux.orghttp://www.linux.org/forums/linux-security.47/
Suricata: The Snort Replacer (Part 3: Rules)Thu, 19 Mar 2015 12:44:35 +0000http://www.linux.org/threads/suricata-the-snort-replacer-part-3-rules.4363/
http://www.linux.org/threads/suricata-the-snort-replacer-part-3-rules.4363/Eric HansenEric HansenIn the previous installment, we configured Suricata and successfully tested it via a simple rule that alerts on ICMP/ping packets being detected. In this part we will cover some aspects about rules. While this will mostly be...

Suricata: The Snort Replacer (Part 3: Rules)]]>13Malware and Antivirus Systems for LinuxThu, 19 Mar 2015 05:20:52 +0000http://www.linux.org/threads/malware-and-antivirus-systems-for-linux.4455/
http://www.linux.org/threads/malware-and-antivirus-systems-for-linux.4455/DevynCJohnsonDevynCJohnsonMalware and Antivirus Systems for Linux]]>59Suricata: The Snort Replacer (Part 2: Configure & Test)Sat, 31 Jan 2015 11:03:32 +0000http://www.linux.org/threads/suricata-the-snort-replacer-part-2-configure-test.4348/
http://www.linux.org/threads/suricata-the-snort-replacer-part-2-configure-test.4348/Eric HansenEric HansenIn part 1, we covered what Suricata is, why we are using it, and how to install it to our system. It wasn’t hard, and the following won’t be much worse, either. Now we are going to do some basic configuration of the program and get it working!...

Suricata: The Snort Replacer (Part 1: Intro & Install)]]>7Virtual Environments for SafetyFri, 25 Jul 2014 15:35:56 +0000http://www.linux.org/threads/virtual-environments-for-safety.6263/
http://www.linux.org/threads/virtual-environments-for-safety.6263/Eric HansenEric HansenPython
The biggest player with this language has been virtualenv until Python 3 came with virtual environment support built in.

I had written an article on choosing the right distro for a desktop system. I decided to write a similar article on choosing the right router, firewall, gateway, etc. Linux distro. Yes, Linux can be used as an operating system for other network devices. Linux is so versatile, its use is not restricted to servers, clusters, desktops, and laptops....

Which Firewall Distro is Right for Me?]]>6Linux Security Tips: Physical PreparationsThu, 17 Oct 2013 15:41:48 +0000http://www.linux.org/threads/linux-security-tips-physical-preparations.4775/
http://www.linux.org/threads/linux-security-tips-physical-preparations.4775/Eric HansenEric Hansen
As a little back story, in 2010 I used to work for a relatively popular web hosting company. They own their own data center (DC) which made a lot of management tasks easy and nice. One thing I took deep note of...

While SSH provides the ability to disallow root logins (“PermitRootLogins no”) its always safe to enforce it whenever possible. As root (ironic? just use sudo su ) edit “/etc/shadow” and where you see “root:...” replace the text (if any) between the first and second...

Some Tips To Secure Your Server]]>pam_unix.so Is Your Security FriendTue, 24 Sep 2013 23:18:10 +0000http://www.linux.org/threads/pam_unix-so-is-your-security-friend.4650/
http://www.linux.org/threads/pam_unix-so-is-your-security-friend.4650/Eric HansenEric Hansen
In short, pam_unix.so is what authenticates you when you log in to a system (local, remote,...

pam_unix.so Is Your Security Friend]]>Tor: Part 2 - Installing and UsingWed, 18 Sep 2013 16:17:23 +0000http://www.linux.org/threads/tor-part-2-installing-and-using.4533/
http://www.linux.org/threads/tor-part-2-installing-and-using.4533/Eric HansenEric Hansen
Luckily Tor has their own deb repository that both Debian and Ubuntu (plus derivatives) can use to get the most recent stable version of...

Tor: Part 2 - Installing and Using]]>7Improving a Tor RelayWed, 18 Sep 2013 03:47:59 +0000http://www.linux.org/threads/improving-a-tor-relay.4625/
http://www.linux.org/threads/improving-a-tor-relay.4625/Eric HansenEric Hansen
Instead I’ll be dissecting the torrc file we’ve edited in the past and go into detail about what the features do. The first is SocksPolicy: